{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T16:19:25Z","timestamp":1757780365626,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030965990"},{"type":"electronic","value":"9783030966003"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96600-3_13","type":"book-chapter","created":{"date-parts":[[2022,2,17]],"date-time":"2022-02-17T14:03:35Z","timestamp":1645106615000},"page":"181-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cascaded Anomaly Detection with Coarse Sampling in Distributed Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0137-9676","authenticated-orcid":false,"given":"Amelia","family":"B\u0103dic\u0103","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8480-9867","authenticated-orcid":false,"given":"Costin","family":"B\u0103dic\u0103","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4645-967X","authenticated-orcid":false,"given":"Marek","family":"Bolanowski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8484-5849","authenticated-orcid":false,"given":"Stefka","family":"Fidanova","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7714-4844","authenticated-orcid":false,"given":"Maria","family":"Ganzha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7109-7247","authenticated-orcid":false,"given":"Stanislav","family":"Harizanov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1946-0384","authenticated-orcid":false,"given":"Mirjana","family":"Ivanovic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5870-2588","authenticated-orcid":false,"given":"Ivan","family":"Lirkov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8069-2152","authenticated-orcid":false,"given":"Marcin","family":"Paprzycki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7573-3856","authenticated-orcid":false,"given":"Andrzej","family":"Paszkiewicz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2602-3991","authenticated-orcid":false,"given":"Kacper","family":"Tomczyk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,18]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","unstructured":"Janus, P., Ganzha, M., Bicki, A., Paprzycki, M.: Applying machine learning to study infrastructure anomalies in a mid-size data center - preliminary considerations. In: Proceedings of the 54th Hawaii International Conference on System Sciences (2021). http:\/\/hdl.handle.net\/10125\/70636. https:\/\/doi.org\/10.24251\/HICSS.2021.025","DOI":"10.24251\/HICSS.2021.025"},{"key":"13_CR2","doi-asserted-by":"publisher","unstructured":"Neu, D.A., Lahann, J., Fettke, P.: A systematic literature review on state-of-the-art deep learning methods for process prediction. Artif. Intell. Rev. (2021). https:\/\/doi.org\/10.1007\/s10462-021-09960-8","DOI":"10.1007\/s10462-021-09960-8"},{"key":"13_CR3","doi-asserted-by":"publisher","unstructured":"Williams, A.W., Pertet, S.M., Narasimhan, P.: Tiresias: black-box failure prediction in distributed systems. In: Proceedings of the 2007 IEEE International Parallel and Distributed Processing Symposium, Long Beach, CA, USA, pp. 1\u20138. IEEE (2007). https:\/\/doi.org\/10.1109\/IPDPS.2007.370345","DOI":"10.1109\/IPDPS.2007.370345"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"110464","DOI":"10.1016\/j.jss.2019.110464","volume":"161","author":"L Mariani","year":"2020","unstructured":"Mariani, L., Pezz\u00e8, M., Riganelli, O., Xin, R.: Predicting failures in multi-tier distributed systems. J. Syst. Softw. 161, 110464 (2020). https:\/\/doi.org\/10.1016\/j.jss.2019.110464","journal-title":"J. Syst. Softw."},{"key":"13_CR5","doi-asserted-by":"publisher","unstructured":"Chen, X., Lu, C., Pattabiraman, K.: Failure prediction of jobs in compute clouds: a google cluster case study. In: Proceedings of the 2014 IEEE International Symposium on Software Reliability Engineering Workshops, Naples, Italy, pp. 341\u2013346. IEEE (2014). https:\/\/doi.org\/10.1109\/ISSREW.2014.105","DOI":"10.1109\/ISSREW.2014.105"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jpdc.2021.02.025","volume":"153","author":"J Zhao","year":"2021","unstructured":"Zhao, J., Ding, Y., Zhai, Y., Jiang, Y., Zhai, Y., Hu, M.: Explore unlabeled big data learning to online failure prediction in safety-aware cloud environment. J. Parallel Distrib. Comput. 153, 53\u201363 (2021). https:\/\/doi.org\/10.1016\/j.jpdc.2021.02.025","journal-title":"J. Parallel Distrib. Comput."},{"key":"13_CR7","unstructured":"https:\/\/medium.com\/apprentice-journal\/pca-application-in-machine-learning-4827c07a61db. Accessed 18 Nov 2021"},{"key":"13_CR8","doi-asserted-by":"publisher","unstructured":"Chigurupati, A., Thibaux, R., Lassar, N.: Predicting hardware failure using machine learning. In: Proceedings of the 2016 Annual Reliability and Maintainability Symposium (RAMS), Tucson, AZ, USA, pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/RAMS.2016.7448033","DOI":"10.1109\/RAMS.2016.7448033"},{"key":"13_CR9","doi-asserted-by":"publisher","unstructured":"Suchatpong, T., Bhumkittipich, K.: Hard Disk Drive failure mode prediction based on industrial standard using decision tree learning. In: Proceedings of the 2014 11th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Nakhon Ratchasima, Thailand, pp. 1\u20134. IEEE (2014). https:\/\/doi.org\/10.1109\/ECTICon.2014.6839839","DOI":"10.1109\/ECTICon.2014.6839839"},{"key":"13_CR10","doi-asserted-by":"publisher","unstructured":"Strom, B.D., Lee, S.C., Tyndall, G.W., Khurshudov, A.: Hard disk drive reliability modeling and failure prediction. In: Proceedings of the Asia-Pacific Magnetic Recording Conference 2006, Singapore, pp. 1\u20132. IEEE (2006). https:\/\/doi.org\/10.1109\/APMRC.2006.365900","DOI":"10.1109\/APMRC.2006.365900"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1016\/j.procs.2020.09.074","volume":"176","author":"L Hu","year":"2020","unstructured":"Hu, L., Han, L., Xu, Z., Jiang, T., Qi, H.: A disk failure prediction method based on LSTM network due to its individual specificity. Proc. Comput. Sci. 176, 791\u2013799 (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.09.074","journal-title":"Proc. Comput. Sci."},{"key":"13_CR12","doi-asserted-by":"publisher","unstructured":"Li, Q., Li, H., Zhang, K.: Prediction of HDD failures by ensemble learning. In: Proceedings of the 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, pp. 237\u2013240. IEEE (2019). https:\/\/doi.org\/10.1109\/ICSESS47205.2019.9040739","DOI":"10.1109\/ICSESS47205.2019.9040739"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"7675","DOI":"10.1109\/ACCESS.2017.2785763","volume":"6","author":"S Zhang","year":"2018","unstructured":"Zhang, S., Wang, Y., Liu, M., Bao, Z.: Data-based line trip fault prediction in power systems using LSTM networks and SVM. IEEE Access 6, 7675\u20137686 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2017.2785763","journal-title":"IEEE Access"},{"issue":"7","key":"13_CR14","doi-asserted-by":"publisher","first-page":"2987","DOI":"10.1007\/s12652-019-01440-w","volume":"11","author":"S Omran","year":"2019","unstructured":"Omran, S., El Houby, E.M.F.: Prediction of electrical power disturbances using machine learning techniques. J. Amb. Intel. Hum. Comput. 11(7), 2987\u20133003 (2019). https:\/\/doi.org\/10.1007\/s12652-019-01440-w","journal-title":"J. Amb. Intel. Hum. Comput."},{"key":"13_CR15","doi-asserted-by":"publisher","unstructured":"Mehlo, N.A., Pretorius, J.H.C., Rhyn, P.V.: Reliability assessment of medium voltage underground cable network using a failure prediction method. In: Proceedings of the 2019 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), Macao, China, pp. 1\u20135. IEEE (2019). https:\/\/doi.org\/10.1109\/APPEEC45492.2019.8994720","DOI":"10.1109\/APPEEC45492.2019.8994720"},{"key":"13_CR16","doi-asserted-by":"publisher","unstructured":"Sachan, S., Zhou, C., Bevan G., Alkali, B.: Failure prediction of power cables using failure history and operational condition. In: Procedings of the 2015 IEEE 11th International Conference on the Properties and Applications of Dielectric Materials (ICPADM), Sydney, NSW, Australia, pp. 380\u2013383. IEEE (2015). https:\/\/doi.org\/10.1109\/ICPADM.2015.7295288","DOI":"10.1109\/ICPADM.2015.7295288"},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"454","DOI":"10.3390\/sym12030454","volume":"12","author":"J-H Kwon","year":"2020","unstructured":"Kwon, J.-H., Kim, E.-J.: Failure prediction model using iterative feature selection for industrial internet of things. Symmetry 12, 454 (2020). https:\/\/doi.org\/10.3390\/sym12030454","journal-title":"Symmetry"},{"key":"13_CR18","doi-asserted-by":"publisher","unstructured":"Fernandes, S., Antunes, M., Santiago, A.R., Barraca, J.P., Gomes, D., Aguiar, R.L.: Forecasting appliances failures: a machine-learning approach to predictive maintenance. Information 11, 208 (2020). https:\/\/doi.org\/10.3390\/info11040208","DOI":"10.3390\/info11040208"},{"key":"13_CR19","doi-asserted-by":"publisher","unstructured":"Cai, Z., Sun, S., Si, S., Wang, N.: Research of failure prediction Bayesian network model. In: Proceedings of the 2009 16th International Conference on Industrial Engineering and Engineering Management, Beijing, China, pp. 2021\u20132025. IEEE (2009). https:\/\/doi.org\/10.1016\/10.1109\/ICIEEM.2009.5344265","DOI":"10.1016\/10.1109\/ICIEEM.2009.5344265"},{"issue":"3","key":"13_CR20","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.jss.2004.02.028","volume":"74","author":"CG Bai","year":"2005","unstructured":"Bai, C.G., Hu, Q.P., Xie, M., Ng, S.H.: Software failure prediction based on a Markov Bayesian network model. J. Syst. Softw. 74(3), 275\u2013282 (2005). https:\/\/doi.org\/10.1016\/j.jss.2004.02.028","journal-title":"J. Syst. Softw."},{"key":"13_CR21","doi-asserted-by":"publisher","unstructured":"Bhuyan, M.H.,\u00a0Bhattacharyya, D.K.,\u00a0Kalita, J.K.: Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-65188-0. ISBN 978-3-319-87968-0","DOI":"10.1007\/978-3-319-65188-0"},{"issue":"61","key":"13_CR22","first-page":"443","volume":"9","author":"M Bolanowski","year":"2015","unstructured":"Bolanowski, M., Twar\u00f3g, B., Mlicki, R.: Anomalies detection in computer networks with the use of SDN. Meas. Autom. Monit. 9(61), 443\u2013445 (2015)","journal-title":"Meas. Autom. Monit."},{"key":"13_CR23","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-11248-0_19","volume-title":"Analysis and Simulation of Electrical and Computer Systems","author":"M Bolanowski","year":"2015","unstructured":"Bolanowski, M., Paszkiewicz, A.: The use of statistical signatures to detect anomalies in computer network. In: Go\u0142\u0119biowski, L., Mazur, D. (eds.) Analysis and Simulation of Electrical and Computer Systems. LNEE, vol. 324, pp. 251\u2013260. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-11248-0_19"},{"key":"13_CR24","doi-asserted-by":"publisher","unstructured":"Zhong, J., Guo, W., Wang, Z.: Study on network failure prediction based on alarm logs. In: Proceedings of the 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), Muscat, Oman, pp. 1\u20137. IEEE (2016). https:\/\/doi.org\/10.1109\/ICBDSC.2016.7460337","DOI":"10.1109\/ICBDSC.2016.7460337"},{"key":"13_CR25","doi-asserted-by":"publisher","unstructured":"Ji, W., Duan, S., Chen, R., Wang, S., Ling, Q.: A CNN-based network failure prediction method with logs. In: Proceedings of the 2018 Chinese Control and Decision Conference (CCDC), Shenyang, China, pp. 4087\u20134090. IEEE (2018). https:\/\/doi.org\/10.1109\/CCDC.2018.8407833","DOI":"10.1109\/CCDC.2018.8407833"},{"key":"13_CR26","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-030-79725-6_13","volume-title":"Complex, Intelligent and Software Intensive Systems","author":"M Bolanowski","year":"2021","unstructured":"Bolanowski, M., Paszkiewicz, A., Rumak, B.: Coarse traffic classification for high-bandwidth connections in a computer network using deep learning techniques. In: Barolli, L., Yim, K., Enokido, T. (eds.) CISIS 2021. LNNS, vol. 278, pp. 131\u2013141. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-79725-6_13"},{"key":"13_CR27","unstructured":"Bolanowski, M., Paszkiewicz, A., Kwater, T., Kwiatkowski, B.:\u00a0The multilayer complex network design with use of the arbiter. Monographs in Applied Informatics, Computing in Science and Technology, Wydawnictwo Uniwersytetu Rzeszowskiego, Rzesz\u00f3w, pp. 116\u2013127 (2015). ISBN 978-83-7996-140-5"},{"key":"13_CR28","unstructured":"https:\/\/pypi.org\/project\/netmiko. Accessed 8 Nov 2021"},{"key":"13_CR29","unstructured":"https:\/\/www.paramiko.org. Accessed 8 Nov 2021"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"https:\/\/www.mathworks.com\/help\/stats\/getting-started-12.html. Accessed 8 Nov 2021","DOI":"10.4337\/9781839101786.00009"},{"key":"13_CR31","unstructured":"https:\/\/www.backblaze.com\/b2\/hard-drive-test-data.html. Accessed 8 Nov 2021"},{"key":"13_CR32","doi-asserted-by":"publisher","unstructured":"Sharafaldin, I., Habibi Lashkari, A., Ghorbani, A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - ICISSP, Funchal, Madeira, Portugal, pp. 108\u2013116. SciTePress (2018). https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"}],"container-title":["Lecture Notes in Computer Science","Big-Data-Analytics in Astronomy, Science, and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96600-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,17]],"date-time":"2022-02-17T14:04:51Z","timestamp":1645106691000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96600-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030965990","9783030966003"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96600-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"18 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bigda2021a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/web-ext.u-aizu.ac.jp\/labs\/is-ds\/BASE2021.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}